Page 325 -
P. 325

308   Chapter 11   Dependability and security


                  REFERENCES

                      Adams, E. N. (1984). ‘Optimizing preventative service of software products’. IBM J. Res & Dev.,
                      28 (1), 2–14.
                      Berghel, H. (2001). ‘The Code Red Worm’. Comm. ACM, 44 (12), 15–19.

                      Boehm, B. W., McClean, R. L. and Urfig, D. B. (1975). ‘Some experience with automated aids to the
                      design of large-scale reliable software’. IEEE Trans. on Software Engineering., SE-1 (1), 125–33.

                      Ellison, R., Linger, R., Lipson, H., Mead, N. and Moore, A. (2002). ‘Foundations of Survivable Systems
                      Engineering’. Crosstalk: The Journal of Defense Software Engineering, 12, 10–15.

                      Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff, T. A. and Mead, N. R. (1999a).
                      ‘Survivability: Protecting Your Critical Systems’. IEEE Internet Computing, 3 (6), 55–63.
                      Ellison, R. J., Linger, R. C., Longstaff, T. and Mead, N. R. (1999b). ‘Survivable Network System
                      Analysis: A Case Study’. IEEE Software, 16 (4), 70–7.
                      Endres, A. (1975). ‘An analysis of errors and their causes in system programs’. IEEE Trans. on
                      Software Engineering., SE-1 (2), 140–9.
                      Laprie, J.-C. (1995). ‘Dependable Computing: Concepts, Limits, Challenges’. FTCS- 25: 25th IEEE
                      Symposium on Fault-Tolerant Computing, Pasadena, Calif.: IEEE Press.
                      Littlewood, B. (1990). ‘Software Reliability Growth Models’. In Software Reliability Handbook. Rook,
                      P. (ed.). Amsterdam: Elsevier. 401–412.
                      Lutz, R. R. (1993). ‘Analysing Software Requirements Errors in Safety-Critical Embedded Systems’.
                      RE'93, San Diego, Calif: IEEE.
                      Mills, H. D., Dyer, M. and Linger, R. (1987). ‘Cleanroom Software Engineering’. IEEE Software, 4 (5),
                      19–25.
                      Nakajo, T. and Kume, H. (1991). ‘A Case History Analysis of Software Error-Cause Relationships’.
                      IEEE Trans. on Software Eng., 18 (8), 830–8.

                      Perrow, C. (1984). Normal Accidents: Living with High-Risk Technology. New York: Basic Books.
                      Pfleeger, C. P. and Pfleeger, S. L. (2007). Security in Computing, 4th edition. Boston: Addison-
                      Wesley.
                      Spafford, E. (1989). ‘The Internet Worm: Crisis and Aftermath’. Comm. ACM, 32 (6), 678–87.
   320   321   322   323   324   325   326   327   328   329   330